Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Capability Access Management Service (camsvc) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Remote Procedure Call can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Management Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Tablet Windows User Interface (TWINUI) Subsystem can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Client-Side Caching (CSC) Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Clipboard Server can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows SMB Server can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Deployment Services can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in NTLM Hash Disclosure can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Motorola Soft Modem Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Dynamic Root of Trust for Measurement (DRTM) can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Kerberos can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows Hello can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Capability Access Management Service (camsvc) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Virtualization-Based Security (VBS) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows NTFS can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows File Explorer can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to gain privileges.
- A tampering vulnerability in LDAP can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Connected Devices Platform Service can be exploited remotely to gain privileges.
- A spoofing vulnerability in Microsoft Windows File Explorer can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Windows Remote Assistance can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows File Explorer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows SMB Server can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Desktop Windows Manager can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows NDIS can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in TPM Trustlet can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Telephony Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Management Services can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows WalletService can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows rndismp6.sys can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Desktop Window Manager can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Remote Procedure Call Interface Definition Language (IDL) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel Memory can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Tablet Windows User Interface (TWINUI) Subsystem can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Secure Boot Certificate Expiration can be exploited remotely to bypass security restrictions.
- A spoofing vulnerability in Windows can be exploited remotely to spoof user interface.
- A denial of service vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows HTTP.sys can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Host Process for Windows Tasks can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2026-20876
CVE-2026-20857
CVE-2026-20940
CVE-2026-20856
CVE-2026-20815
CVE-2026-20860
CVE-2026-20821
CVE-2026-20877
CVE-2026-20822
CVE-2026-20826
CVE-2026-20837
CVE-2026-20866
CVE-2026-20814
CVE-2026-20865
CVE-2026-20818
CVE-2026-20839
CVE-2026-20858
CVE-2026-20838
CVE-2026-20844
CVE-2026-20854
CVE-2026-20927
CVE-2026-0386
CVE-2026-20872
CVE-2026-20918
CVE-2024-55414
CVE-2026-20962
CVE-2026-20833
CVE-2026-20817
CVE-2026-20849
CVE-2023-31096
CVE-2026-20811
CVE-2026-20852
CVE-2026-20835
CVE-2026-20820
CVE-2026-20935
CVE-2026-20922
CVE-2026-20823
CVE-2026-20938
CVE-2026-20804
CVE-2026-20843
CVE-2026-20812
CVE-2026-20939
CVE-2026-20874
CVE-2026-20864
CVE-2026-20847
CVE-2026-20924
CVE-2026-20824
CVE-2026-20808
CVE-2026-20919
CVE-2026-20869
CVE-2026-20873
CVE-2026-20934
CVE-2026-20861
CVE-2026-20819
CVE-2026-20871
CVE-2026-20859
CVE-2026-20936
CVE-2026-20829
CVE-2026-20842
CVE-2026-20848
CVE-2026-20926
CVE-2026-20931
CVE-2026-20921
CVE-2026-20932
CVE-2026-20867
CVE-2026-20840
CVE-2026-20862
CVE-2026-20816
CVE-2026-20853
CVE-2026-20828
CVE-2026-20805
CVE-2026-20825
CVE-2026-21221
CVE-2026-20868
CVE-2026-20832
CVE-2026-20809
CVE-2026-20827
CVE-2026-21265
CVE-2026-20937
CVE-2026-20834
CVE-2026-20875
CVE-2026-20929
CVE-2026-20941
CVE-2026-20810
CVE-2026-20925
CVE-2026-20923
CVE-2026-20863
CVE-2026-20836
CVE-2026-20851
CVE-2026-20870
CVE-2026-20830
CVE-2026-20920
CVE-2026-20831
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
- Microsoft-Windows-Server-2025
Список CVE
- CVE-2023-31096 critical
- CVE-2024-55414 critical
- CVE-2026-0386 critical
- CVE-2026-20804 critical
- CVE-2026-20805 high
- CVE-2026-20808 high
- CVE-2026-20809 critical
- CVE-2026-20810 critical
- CVE-2026-20811 critical
- CVE-2026-20812 high
- CVE-2026-20814 high
- CVE-2026-20815 high
- CVE-2026-20816 high
- CVE-2026-20817 critical
- CVE-2026-20818 high
- CVE-2026-20819 high
- CVE-2026-20820 critical
- CVE-2026-20821 high
- CVE-2026-20822 critical
- CVE-2026-20823 high
- CVE-2026-20824 high
- CVE-2026-20825 warning
- CVE-2026-20826 critical
- CVE-2026-20827 high
- CVE-2026-20828 warning
- CVE-2026-20829 high
- CVE-2026-20830 high
- CVE-2026-20831 critical
- CVE-2026-20832 critical
- CVE-2026-20833 high
- CVE-2026-20834 warning
- CVE-2026-20835 high
- CVE-2026-20836 high
- CVE-2026-20837 critical
- CVE-2026-20838 high
- CVE-2026-20839 high
- CVE-2026-20840 critical
- CVE-2026-20842 high
- CVE-2026-20843 critical
- CVE-2026-20844 high
- CVE-2026-20847 high
- CVE-2026-20848 critical
- CVE-2026-20849 critical
- CVE-2026-20851 high
- CVE-2026-20852 critical
- CVE-2026-20853 high
- CVE-2026-20854 critical
- CVE-2026-20856 critical
- CVE-2026-20857 critical
- CVE-2026-20858 critical
- CVE-2026-20859 critical
- CVE-2026-20860 critical
- CVE-2026-20861 critical
- CVE-2026-20862 high
- CVE-2026-20863 high
- CVE-2026-20864 critical
- CVE-2026-20865 critical
- CVE-2026-20866 critical
- CVE-2026-20867 critical
- CVE-2026-20868 critical
- CVE-2026-20869 high
- CVE-2026-20870 critical
- CVE-2026-20871 critical
- CVE-2026-20872 high
- CVE-2026-20873 critical
- CVE-2026-20874 critical
- CVE-2026-20875 critical
- CVE-2026-20876 high
- CVE-2026-20877 critical
- CVE-2026-20918 critical
- CVE-2026-20919 critical
- CVE-2026-20920 critical
- CVE-2026-20921 critical
- CVE-2026-20922 critical
- CVE-2026-20923 critical
- CVE-2026-20924 critical
- CVE-2026-20925 high
- CVE-2026-20926 critical
- CVE-2026-20927 high
- CVE-2026-20929 critical
- CVE-2026-20931 critical
- CVE-2026-20932 high
- CVE-2026-20934 critical
- CVE-2026-20935 high
- CVE-2026-20936 warning
- CVE-2026-20937 high
- CVE-2026-20938 critical
- CVE-2026-20939 high
- CVE-2026-20940 critical
- CVE-2026-20941 critical
- CVE-2026-20962 warning
- CVE-2026-21221 high
- CVE-2026-21265 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!